WO2002080599A1 - Method for controlling a user terminal of a communications network - Google Patents

Method for controlling a user terminal of a communications network Download PDF

Info

Publication number
WO2002080599A1
WO2002080599A1 PCT/IB2002/000757 IB0200757W WO02080599A1 WO 2002080599 A1 WO2002080599 A1 WO 2002080599A1 IB 0200757 W IB0200757 W IB 0200757W WO 02080599 A1 WO02080599 A1 WO 02080599A1
Authority
WO
WIPO (PCT)
Prior art keywords
restricted
communications link
mode
entry
mode list
Prior art date
Application number
PCT/IB2002/000757
Other languages
French (fr)
Inventor
Ulrich Müller
Original Assignee
Nokia Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Corporation filed Critical Nokia Corporation
Priority to DE60230397T priority Critical patent/DE60230397D1/en
Priority to US10/473,327 priority patent/US7003320B2/en
Priority to EP02707036A priority patent/EP1374610B8/en
Publication of WO2002080599A1 publication Critical patent/WO2002080599A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/677Preventing the dialling or sending of predetermined telephone numbers or selected types of telephone numbers, e.g. long distance numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/14Details of telephonic subscriber devices including a card reading device

Definitions

  • the present invention relates to a method for controlling a user terminal of a communications network.
  • a user terminal for example a mobile phone or a telematics unit usually comprises a communications unit, a subscriber identification means and memory means for storing data of frequently used communications links.
  • memory means are provided as a personal phone book or the like on a SIM- card used as subscriber identification means.
  • SIM-card is used to prevent unallowed use of a mobile phone or a telematics unit by an unauthorized person. Therefore, after switching on a mobile phone or a telematics unit the user is prompted to in- put the personal identification number (PIN) that should be known only to persons who are authorized to use the corresponding user terminal in a com- munications network, in particular in a radio communications network.
  • PIN personal identification number
  • an elementary file can be stored in the subscriber identification means for generating a fixed dialling number phone book the entries of which include a name or an identifier and/or an ID-number of a communications link and/or a class of communications links which are allowed only when the restricted using mode of a user terminal is enabled.
  • the ID-number can be either a usual dialling number or a supplementary service control string.
  • a user terminal that provides the feature of a restricted using mode can be used only in this restricted using mode unless a second personal identification number will be entered.
  • This second personal identification number should be known only to the owner of the terminal or the SIM-card used therein, but not to a user who is allowed to use this terminal only in the restricted using mode.
  • the restricted using mode is disabled and the user terminal can be used for unrestricted calls.
  • it is possible to edit the elementary file for fixed dialling numbers i.e. to add new entries, to delete entries or to amend entries to determine the extend or restriction of the use of the specific user terminal.
  • a dialling number input either from a key pad of the user terminal or from a personal phone book for requesting a call, is compared with the ID-numbers contained in the elementary file for fixed dialling numbers so as to allow the requested call only if the number input matches an ID-number of an entry in the elementary file for fixed dialling numbers. In case that the input dialling number does not match an ID-number the requested call is rejected.
  • the vehicles of the a fleet are provided with user terminals like mobile phones or telematics units it is possible for the fleet management to restrict the use of the mobile phones or telematics units so that, for example, private calls of the drivers of the vehicles can be prevented.
  • Another example illustrates this problem. If the vehicles of the fleet of a car rental company are provided with telematics units to enable emergency services, traffic information services, route guidance services and other traffic related services, it is not possible to enter this ID-numbers in the elementary file for fixed dialling numbers since the ID-numbers of the respective communications links are not known. Therefore, the telematics unit can be used ei- ther unrestricted or without the traffic related services. In particular, it is not possible to offer only some of the value-added services in accordance with the customers wishes.
  • the dialling number or a supplementary service control string is input via a user interface or from a memory like a specific memory for ID-numbers of value-added services or a personal telephone book.
  • the dialling number is compared with that in the restricted using mode list as known in the prior art .
  • the dialling number is retrieved from a memory a name or an identifier of the requested communications link that belongs to the request is compared with identifiers in the restricted using mode list and if the name of the requested communications link matches the name of an entry in the restricted using mode list, the request is allowed and the requested communications link will be build up without comparing the ID-number with that of the restricted using mode list.
  • the dialling number is checked in the usual way for allowing or rejecting the request.
  • a car rental company it is possible for a car rental company to comply with the customer's wishes for a use of specific traffic related services. If a customer wishes to use not only an emergency service but also a traffic information service and a route guidance service, so the identifiers or a name of the respective services are entered into the restricted using mode list on a subscriber identification means. Therefore the customer who inserts this subscriber identification means in the user terminal device can use this user terminal exactly to this extend he/she wishes. On the other hand, if the next customer wishes to use the emergency service only the identifiers of the other services are deleted from the restrict using mode list and therefore, these services are disabled in case that the restricted using mode is enabled.
  • an advantageous refinement of the invention is characterized by checking, in case that an entry in the memory means has been selected for requesting a communications link, whether or not the corresponding communications link provides access to value added services; and, if so, comparing the identifer of a selected entry with the identifiers of the restricted using mode list; otherwise continuing with comparing the ID-number of the requested communications link with the entries of the restricted using mode list.
  • checking whether a requested communications link provides access to value added services can be easily performed by checking whether or not a selected entry is stored in the list of entries for communications links which provides access to value added services for.
  • Figure 1 shows a simplified schematic block diagram of a telematics unit serving as an example for a user terminal.
  • Figure 2a shows a simplified schematic memory structure used for storing the identifier and the ID-numbers or dialling numbers of specific value-added services
  • Figure 2b shows a simplified schematic structure of an elementary file for fixed dialling numbers stored in a memory of a subscriber identification module
  • Figure 3 shows a simplified schematic flow chart for the inventive method.
  • a telematics unit 10 that is described as an example for a user terminal includes a mobile equipment 1 1 as a communications unit and a SIM-card 12 as a subscriber identification means.
  • the mobile equipment 1 1 comprises a central control unit 13 including processing means (not shown) and memory means (not shown) as necessary for communicating via a telecommunications network and for processing positioning information received from a positioning system and for dealing with data input by a user.
  • the control unit 13 is connected with a transmitting /receiving module 14 for communicating via a telecommunications network, with a positioning module 15 for receiving positioning data and with a user interface 16.
  • the user interface 16 comprises for example a display 17 for output- ting data to a user and a key pad 18 for inputting data by a user.
  • a display 17 for output- ting data to a user
  • a key pad 18 for inputting data by a user.
  • other output and input means can be provided.
  • control unit 13 is. provided with connecting means 19 intended to cooperate with respective connecting means 20 of a SIM-card 12 for building up a connection between the control unit 13 and processing means 21 provided on the SIM-card 12.
  • the processing means 21 of the SIM-card 12 is connected with the connecting means 20 via a respective interface 22.
  • memory means 23 is provided on the SIM-card 12 and is connected to the processing means 21.
  • the memory means 23 is used for storing data necessary to identify the telematics unit 10 as a specific telematics unit used by an registered subscriber.
  • safety codes like first and second identification numbers, elementary files like a personal phone book, a restricted using mode list EF-FDN, and the like.
  • alpha identifier i.e.
  • alpha numeric identifiers like names Al and corresponding dialling numbers of several value-added services like emergency service, car tracking, breakdown service, traffic information service, route guidance service, sightseeing information service, position related event service, position related general information service and the like can be stored in specific files or portions in the memory means 23 on the SIM-card 12.
  • every data necessary for individualization of a telematics unit 10 and for making the wanted services available should be stored in the memory means 23 on the SIM-card 12.
  • the identifiers Al are stored in a service list 24 whereas the ID-numbers of the communications links CL for access to the services can be stored in a separate file or list 25. In particular, it is possible to use only one identifier for a group of services using different communications links.
  • the complete telematics unit 10 is switched on. Thereafter, the user is firstly prompted to input the first personal identification number to identify him/ herself as authorized user. Thereafter, the telematics unit is activated and can be operated in a restricted using mode that is automatically enabled after activating the telematics unit 10.
  • the user has to enter a second personal identification number to identify her/himself as being authorized to use the telematics unit in an unrestricted manner and to edit the restricted using mode list EF-FDN. Editing the restricted using mode list EF-FDN is possible within the telematics unit 10 but should be also possible outside the telematics unit 10 in a specific editing station (not shown). However, in both cases at least the second personal identification number have to be input to allow the user editing the restricted using mode list EF-FDN.
  • step S 10 When a user intends to call someone else, he/she has to input a request for a communications link as shown as step S 10 in .
  • Figure 3 inputting such a re- quest can be performed either by inputting a dialling number DN via the user interface 16 or by selecting an entry of a personal phone book or by selecting a specific service from a service list 24 generally available with this specific telematics unit 10. If the request is input by means of the personal phone book or the service list 24, the name or identifier Al of the person or service to be called is input together with the respective dialling number. Thereafter, it is checked in step S20 whether or not the restricted using mode is enabled.
  • step S30 If the answer is yes it is checked in step S30 whether or not the dialling number is input from a special memory, i.e. from the service list that is for download use only. If the answer is no, e. g. if the dialling number is input via the user interface 16, the dialling number as input is compared in step S40 with the dialling number entries of the restricted using mode list EF-FDN. If the answer is yes, i.e. if the dialling number as input matches one of the dialling number entries in the restricted using mode list EF-FDN the dialling number DN will be dialed in step S50.
  • a special memory i.e. from the service list that is for download use only. If the answer is no, e. g. if the dialling number is input via the user interface 16, the dialling number as input is compared in step S40 with the dialling number entries of the restricted using mode list EF-FDN. If the answer is yes, i.e. if the dialling number as input matches
  • step S20 If the restricted using mode is disabled, i.e. the answer in step S20 is no, the method branches directly to step S50 so that any dialling number input from anywhere will be dialed in step S50.
  • step S30 which source is used for inputting the dialling number DN
  • step S35 to check whether or not the identifier Al of the request matches an entry of the restricted using mode list EF-FDN.
  • the method continous to check whether or not a communications link CL according to the dialling number DN as input is allowed as it is done for a dialling number input via the user interface 16.
  • step S50 for dialling the corresponding dialling number DN without checking the dialling number itself.
  • dialling number DN is associated with the name or identifier Al of a service in such a way that it cannot be manipulated by a user.
  • the dialling number DN for connecting the respective service provider can be changed by downloading from the service provider without causing problems when requesting a communications link to the service or service provider, since the dialling number itself is not checked but only the associated identifier of the requested service.
  • step 40 the method goes from step 40 to step 45 and reject the request for the communications link CL.
  • the user is preferably informed that the request as input is not allowed or not possible in the actual using mode of the telematics unit 10.
  • the service provider offers traffic related services as groups or packages of different categories, for example if the provider offers a first category package of services including emergency services, remote and car tracking services, a second category package of services including the services of that of the first category and in addition a breakdown service, and a third category service package that allows access to all of the former services and to any other offered comfort services like traffic information and route guidance services, it is possible to provide access to these services stepwise by specific identifier like #lservice#, #2service# and #3service# in this case only one of the identifiers of the different packages of services has to be entered into the restricted using mode list EF-FDN to allow access to all services of the respective package.
  • the entry of one of the service packages allows access to all dialling numbers DN associated with the respective identifier Al.
  • the identifier Al of the second category package of services is registered in the restricted using mode list EF- FDN so that all dialling numbers DN associated with this identifier Al are allowed for service access.
  • the telematics unit is provided with a backup subscriber identification module that includes a restricted using mode list EF-FDN and if a SIM-card 12 is inserted in the mobile equipment 1 1 of the telematics unit 10, but without an entry of any service, and this SIM-card is already known in the telematics unit internal SIM table as a SIM-card that usually allows access to 5 value-added services it is possible to prompt the user for the second personal identification number and the desired services, i.e. the desired package of services that shall be allowed. If the second personal identification number is successfully entered the respective entry within the restricted using mode list of the SIM-card than will be done into the restricted using mode list EF-FDN in the memory 23 of the SIM-card 12.
  • the backup subscriber identification module of the telematics unit and the
  • SIM-card of the user are handled similar. If the backup subscriber identifica-
  • . . . tion module has no applicable entry in a respective restricted using mode list
  • emergency calls and short message service will be allowed assuming that the owner of the backup subscriber identification module agrees with when this module is build into the telematics unit and a registration for the first level package of services is done with it and has been 0 confirmed by the user before.
  • step S30 it is checked from which kind of memory the dialling number DN has been retrieved when it has been verified in step S30 that the dialling number DN is received from a memory.
  • the method goes immediately to step S40 if the dialling
  • 25 number DN has not been received from the special memory that is for download use only, i.e. if the dialling number DN is received from a personal phone book that can be edit by any authorized user without inputting the second personal identification number.
  • the dialling number is retrieved from a memory containing dialling numbers for communications links 30 to specific services which are associated with service identifier inserted in a service list, the associated identifier of a service or a package of services is compared with the entries in the restricted using mode list.
  • a backup subscriber identification module or a user subscriber identification module can be configured to allow only selected value-added services and to set up calls to a lot of defined phone numbers, for example to phone numbers of the company of the car holders or the fleet management.

Abstract

The present invention relates to a method for controlling a user terminal of a communications network, said user terminal having a communications unit, a subscriber identification means including a restricted using mode list each entry of which includes an identifier (AI) and/or an ID-number of a communications link and/or a class of communications links which are allowed when a restricted using mode of said user terminal is enabled, and memory means for storing entries including identifers and associated ID-numbers of communications links. The inventive method comprising the steps of: inputting a request for a communications link (S10); and building-up said requested communications link (S50), if said restricted using mode is not enabled (S20); otherwise comparing said ID-number of said requested communications link with said entries of said restricted using mode list (S40); and building-up said requested communications link (S50), if said ID-number matches an entry of said restricted using mode list; otherwise rejecting said request (S45). In order to make it possible that communications links the ID-number of which cannot be entered into a restricted using mode list can be selectively allowed even if the restricted using mode of the user terminal is enabled, the inventive method comprises the following additional steps: comparing, in case that an entry in said memory means has been selected for requesting a communications link, said identifer (AI) of a selected entry with said identifiers of said restricted using mode list (S35); and building-up said requested communications link (S50), if said identifier matches an entry of said restricted using mode list; otherwise continuing with comparing said ID-number of said requested communications link with said entries of said restricted using mode list (S40).

Description

Method for controlling a user terminal of a communications network
The present invention relates to a method for controlling a user terminal of a communications network.
A user terminal, for example a mobile phone or a telematics unit usually comprises a communications unit, a subscriber identification means and memory means for storing data of frequently used communications links. Usually such memory means are provided as a personal phone book or the like on a SIM- card used as subscriber identification means.
As well known in the art a SIM-card is used to prevent unallowed use of a mobile phone or a telematics unit by an unauthorized person. Therefore, after switching on a mobile phone or a telematics unit the user is prompted to in- put the personal identification number (PIN) that should be known only to persons who are authorized to use the corresponding user terminal in a com- munications network, in particular in a radio communications network.
To allow a restricted use, in particular call restrictions for the user of the terminal an elementary file can be stored in the subscriber identification means for generating a fixed dialling number phone book the entries of which include a name or an identifier and/or an ID-number of a communications link and/or a class of communications links which are allowed only when the restricted using mode of a user terminal is enabled. The ID-number can be either a usual dialling number or a supplementary service control string.
After switching on and inputting the personal identification number a user terminal that provides the feature of a restricted using mode can be used only in this restricted using mode unless a second personal identification number will be entered. This second personal identification number should be known only to the owner of the terminal or the SIM-card used therein, but not to a user who is allowed to use this terminal only in the restricted using mode.
After inputting the second personal identification number the restricted using mode is disabled and the user terminal can be used for unrestricted calls. In addition, it is possible to edit the elementary file for fixed dialling numbers, i.e. to add new entries, to delete entries or to amend entries to determine the extend or restriction of the use of the specific user terminal. In case that the restricted using mode is enabled a dialling number input either from a key pad of the user terminal or from a personal phone book for requesting a call, is compared with the ID-numbers contained in the elementary file for fixed dialling numbers so as to allow the requested call only if the number input matches an ID-number of an entry in the elementary file for fixed dialling numbers. In case that the input dialling number does not match an ID-number the requested call is rejected.
If the vehicles of the a fleet are provided with user terminals like mobile phones or telematics units it is possible for the fleet management to restrict the use of the mobile phones or telematics units so that, for example, private calls of the drivers of the vehicles can be prevented.
However, in case that the restricted using mode is enabled it is no longer possible to use value-added services with this user terminal since the Id-numbers of the value-added services are not known to the subscribers but are downloaded via the communications network into a specific memory means, file or region so that it is possible for the service provider to change the ID- number stored in the user terminal each time the ID-number of the value- added service has been changed due to an update of the standard structure that is used by the value-added service.
It might be possible to copy the ID-number of a value-added service stored in a specific memory in the user terminal and to input this ID-number into the elementary file for fixed dialling numbers so that this value-added service can be used even if the restricted using mode is enabled. However, in case that the ID-number of a specific value-added service has been changed the new ID-number is downloaded into the subscriber's user terminal and stored in the specific memory. After such an update a request for a communications link to this value-added service will be rejected in the restricted using mode since the new number doesn't match any number of the fixed dialling numbers stored in the respective elementary file.
Another example illustrates this problem. If the vehicles of the fleet of a car rental company are provided with telematics units to enable emergency services, traffic information services, route guidance services and other traffic related services, it is not possible to enter this ID-numbers in the elementary file for fixed dialling numbers since the ID-numbers of the respective communications links are not known. Therefore, the telematics unit can be used ei- ther unrestricted or without the traffic related services. In particular, it is not possible to offer only some of the value-added services in accordance with the customers wishes. Accordingly it is an object of the present invention to provide a method for controlling a user terminal in such a way that communications links the ID- number of which cannot be entered into a restricted using mode list can be selectively allowed even if the restricted using mode of the user terminal is enabled.
This object is achieved by the method according to claim 1. Advantageous developments and refinements of the invention are described in the sub-claims.
According to the present invention, after inputting a request for a communications link, it is first checked whether the ID-number of the requested communications link, i.e. the dialling number or a supplementary service control string is input via a user interface or from a memory like a specific memory for ID-numbers of value-added services or a personal telephone book. In case that an ID-number, in particular a dialling number is input via the user interface, the dialling number is compared with that in the restricted using mode list as known in the prior art . However, if the dialling number is retrieved from a memory a name or an identifier of the requested communications link that belongs to the request is compared with identifiers in the restricted using mode list and if the name of the requested communications link matches the name of an entry in the restricted using mode list, the request is allowed and the requested communications link will be build up without comparing the ID-number with that of the restricted using mode list. In case that the name of the requested communications link does not match an entry of the restricted using mode list the dialling number is checked in the usual way for allowing or rejecting the request.
Thus, it is possible to select one or more value-added services that can be used even if a restricted using mode of a user terminal is enabled by simply inserting the corresponding identifier into the restricted using mode list.
Referring back to the above example, according to the present invention it is possible for a car rental company to comply with the customer's wishes for a use of specific traffic related services. If a customer wishes to use not only an emergency service but also a traffic information service and a route guidance service, so the identifiers or a name of the respective services are entered into the restricted using mode list on a subscriber identification means. Therefore the customer who inserts this subscriber identification means in the user terminal device can use this user terminal exactly to this extend he/she wishes. On the other hand, if the next customer wishes to use the emergency service only the identifiers of the other services are deleted from the restrict using mode list and therefore, these services are disabled in case that the restricted using mode is enabled.
To improve the reliablity of restricting the use to an extent defined by the owner of the user terminal or the subscriber identification means an advantageous refinement of the invention is characterized by checking, in case that an entry in the memory means has been selected for requesting a communications link, whether or not the corresponding communications link provides access to value added services; and, if so, comparing the identifer of a selected entry with the identifiers of the restricted using mode list; otherwise continuing with comparing the ID-number of the requested communications link with the entries of the restricted using mode list. If the entries for communications links which provides access to value added services are stored in a corresponding list or file in the memory means, checking whether a requested communications link provides access to value added services can be easily performed by checking whether or not a selected entry is stored in the list of entries for communications links which provides access to value added services for.
An exemplary embodiment of the present invention is described in detail below with reference to the accompanying drawings. In the drawings:
Figure 1 shows a simplified schematic block diagram of a telematics unit serving as an example for a user terminal.
Figure 2a shows a simplified schematic memory structure used for storing the identifier and the ID-numbers or dialling numbers of specific value-added services,
Figure 2b shows a simplified schematic structure of an elementary file for fixed dialling numbers stored in a memory of a subscriber identification module, and
Figure 3 shows a simplified schematic flow chart for the inventive method.
Identical parts and elements are consequently provided with the same reference symbols throughout the drawings.
According to Figure 1 a telematics unit 10 that is described as an example for a user terminal includes a mobile equipment 1 1 as a communications unit and a SIM-card 12 as a subscriber identification means. The mobile equipment 1 1 comprises a central control unit 13 including processing means (not shown) and memory means (not shown) as necessary for communicating via a telecommunications network and for processing positioning information received from a positioning system and for dealing with data input by a user. The control unit 13 is connected with a transmitting /receiving module 14 for communicating via a telecommunications network, with a positioning module 15 for receiving positioning data and with a user interface 16. The user interface 16 comprises for example a display 17 for output- ting data to a user and a key pad 18 for inputting data by a user. In stead of the display 17 and the key pad 18 other output and input means can be provided. In particular, it is also possible to provide a user interface 16 with audio output means like a loudspeaker and with voice input means in case that the control unit 13 supports voice control and audio or speech output.
Further, the control unit 13 is. provided with connecting means 19 intended to cooperate with respective connecting means 20 of a SIM-card 12 for building up a connection between the control unit 13 and processing means 21 provided on the SIM-card 12. The processing means 21 of the SIM-card 12 is connected with the connecting means 20 via a respective interface 22. Further, memory means 23 is provided on the SIM-card 12 and is connected to the processing means 21. The memory means 23 is used for storing data necessary to identify the telematics unit 10 as a specific telematics unit used by an registered subscriber. In addition, safety codes like first and second identification numbers, elementary files like a personal phone book, a restricted using mode list EF-FDN, and the like. In addition, alpha identifier, i.e. alpha numeric identifiers like names Al and corresponding dialling numbers of several value-added services like emergency service, car tracking, breakdown service, traffic information service, route guidance service, sightseeing information service, position related event service, position related general information service and the like can be stored in specific files or portions in the memory means 23 on the SIM-card 12. In particular, every data necessary for individualization of a telematics unit 10 and for making the wanted services available should be stored in the memory means 23 on the SIM-card 12.
The identifiers Al are stored in a service list 24 whereas the ID-numbers of the communications links CL for access to the services can be stored in a separate file or list 25. In particular, it is possible to use only one identifier for a group of services using different communications links.
After inserting the SIM-card 12 into the device of the mobile equipment 1 1 so that the processing means 21 and the control unit 13 are interconnected the complete telematics unit 10 is switched on. Thereafter, the user is firstly prompted to input the first personal identification number to identify him/ herself as authorized user. Thereafter, the telematics unit is activated and can be operated in a restricted using mode that is automatically enabled after activating the telematics unit 10.
To disable the restricted using mode the user has to enter a second personal identification number to identify her/himself as being authorized to use the telematics unit in an unrestricted manner and to edit the restricted using mode list EF-FDN. Editing the restricted using mode list EF-FDN is possible within the telematics unit 10 but should be also possible outside the telematics unit 10 in a specific editing station (not shown). However, in both cases at least the second personal identification number have to be input to allow the user editing the restricted using mode list EF-FDN.
When a user intends to call someone else, he/she has to input a request for a communications link as shown as step S 10 in . Figure 3 inputting such a re- quest can be performed either by inputting a dialling number DN via the user interface 16 or by selecting an entry of a personal phone book or by selecting a specific service from a service list 24 generally available with this specific telematics unit 10. If the request is input by means of the personal phone book or the service list 24, the name or identifier Al of the person or service to be called is input together with the respective dialling number. Thereafter, it is checked in step S20 whether or not the restricted using mode is enabled. If the answer is yes it is checked in step S30 whether or not the dialling number is input from a special memory, i.e. from the service list that is for download use only. If the answer is no, e. g. if the dialling number is input via the user interface 16, the dialling number as input is compared in step S40 with the dialling number entries of the restricted using mode list EF-FDN. If the answer is yes, i.e. if the dialling number as input matches one of the dialling number entries in the restricted using mode list EF-FDN the dialling number DN will be dialed in step S50.
If the restricted using mode is disabled, i.e. the answer in step S20 is no, the method branches directly to step S50 so that any dialling number input from anywhere will be dialed in step S50.
However, if the restricted using mode is enabled, so that it is checked in step S30 which source is used for inputting the dialling number DN, and if it is determined that the dialling number is input from the special memory, the method branches to step S35 to check whether or not the identifier Al of the request matches an entry of the restricted using mode list EF-FDN. In case that the identifier Al or a name of the request is not found in the restricted using mode list the method continous to check whether or not a communications link CL according to the dialling number DN as input is allowed as it is done for a dialling number input via the user interface 16.
However, if the identifier Al or a name is found in the restricted using mode list the method goes to step S50 for dialling the corresponding dialling number DN without checking the dialling number itself.
In the latter case it is presumed that the dialling number DN is associated with the name or identifier Al of a service in such a way that it cannot be manipulated by a user.
Therefore, it is possible that the dialling number DN for connecting the respective service provider can be changed by downloading from the service provider without causing problems when requesting a communications link to the service or service provider, since the dialling number itself is not checked but only the associated identifier of the requested service.
In case that there is no service entry in the restricted using mode list EF-FDN and if there is no dialling number DN entry, either, the method goes from step 40 to step 45 and reject the request for the communications link CL. When rejecting a request the user is preferably informed that the request as input is not allowed or not possible in the actual using mode of the telematics unit 10.
In case that the service provider offers traffic related services as groups or packages of different categories, for example if the provider offers a first category package of services including emergency services, remote and car tracking services, a second category package of services including the services of that of the first category and in addition a breakdown service, and a third category service package that allows access to all of the former services and to any other offered comfort services like traffic information and route guidance services, it is possible to provide access to these services stepwise by specific identifier like #lservice#, #2service# and #3service# in this case only one of the identifiers of the different packages of services has to be entered into the restricted using mode list EF-FDN to allow access to all services of the respective package. In this case the entry of one of the service packages allows access to all dialling numbers DN associated with the respective identifier Al. For example, as shown in Figure 2b, the identifier Al of the second category package of services is registered in the restricted using mode list EF- FDN so that all dialling numbers DN associated with this identifier Al are allowed for service access. If the telematics unit is provided with a backup subscriber identification module that includes a restricted using mode list EF-FDN and if a SIM-card 12 is inserted in the mobile equipment 1 1 of the telematics unit 10, but without an entry of any service, and this SIM-card is already known in the telematics unit internal SIM table as a SIM-card that usually allows access to 5 value-added services it is possible to prompt the user for the second personal identification number and the desired services, i.e. the desired package of services that shall be allowed. If the second personal identification number is successfully entered the respective entry within the restricted using mode list of the SIM-card than will be done into the restricted using mode list EF-FDN in the memory 23 of the SIM-card 12.
10
The backup subscriber identification module of the telematics unit and the
SIM-card of the user are handled similar. If the backup subscriber identifica-
. . . tion module has no applicable entry in a respective restricted using mode list
EF-FDN, it can be provided that only the basic level package of services, i.e.
15 emergencies services, remote and car tracking services are allowed to improve the safety of the passengers of the respective vehicle in case of emergency. In particular, this means emergency calls and short message service will be allowed assuming that the owner of the backup subscriber identification module agrees with when this module is build into the telematics unit and a registration for the first level package of services is done with it and has been 0 confirmed by the user before.
According to another embodiment of the present invention it is checked from which kind of memory the dialling number DN has been retrieved when it has been verified in step S30 that the dialling number DN is received from a memory. In this case, the method goes immediately to step S40 if the dialling
25 number DN has not been received from the special memory that is for download use only, i.e. if the dialling number DN is received from a personal phone book that can be edit by any authorized user without inputting the second personal identification number. In this case only if the dialling number is retrieved from a memory containing dialling numbers for communications links 30 to specific services which are associated with service identifier inserted in a service list, the associated identifier of a service or a package of services is compared with the entries in the restricted using mode list.
Thus it is checked whether the request as input is for a communications link to a service or service provider, so as to prevent that a user tries to dial an
O unallowed dialling number by inputting the desired dialling number together with the name of a service as entered in the restricted using mode list. Thus, for example both, a backup subscriber identification module or a user subscriber identification module can be configured to allow only selected value-added services and to set up calls to a lot of defined phone numbers, for example to phone numbers of the company of the car holders or the fleet management.

Claims

Claims
1. Method for controlling a user terminal (10) of a communications network, said user terminal ( 10) having a communications unit (11), a subscriber identification means (12) including a restricted using mode list (EF-FDN) each entry of which includes an identifier (Al) and/or an ID-number (DN, SSCS) of a communications link and /or a class of communications links which are allowed when a restricted using mode of said user terminal (10) is enabled, and memory means (23) for storing entries including identifers (Al) and associated ID-numbers (DN, SSCS) of communications links; said method comprising the steps of:
10 inputting a request for a communications link; and building-up said requested communications link, if said restricted using mode is not enabled; otherwise comparing said ID-number (DN, SSCS) of said requested communications link with said entries of said restricted using mode list (EF-FDN); and 15 - building-up said requested communications link, if said ID-number (DN, SSCS) matches an entry of said restricted using mode list (EF-FDN); otherwise rejecting said request; chracterized by comparing, in case that an entry in said memory means (23) has been
20 selected for requesting a communications link, said identifer (Al) of a selected entry with said identifiers (Al) of said restricted using mode list (EF-FDN); and building-up said requested communications link, if said identifier (Al) matches an entry of said restricted using mode list (EF-FDN); otherwise continuing with comparing said ID-number of said requested communications link with said entries of said restricted using mode list (EF-FDN).
25
2. Method according to claim 1 , characterized by checking, in case that an entry in said memory means (23) has been selected for requesting a communications link, whether or not the corresponding communications link provides access to value added services; and if so, comparing said identifer (Al) of said selected entry with said identifiers (Al) of said restricted using mode list (EF-FDN); otherwise continuing with comparing said ID -number of said requested communications link with said entries of said restricted using mode list (EF-FDN).
3. Method according to claim 2, characterized, in that
<3 Q said entries for communications links which provides access to value added services are stored in a corresponding list (24) in said memory means (23); and it is checked whether or not a selected entry is stored in said list (24) of entries for communications links which provides access to value added services for checking whether or not the corresponding communications link provides access to value added services.
PCT/IB2002/000757 2001-03-28 2002-03-12 Method for controlling a user terminal of a communications network WO2002080599A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
DE60230397T DE60230397D1 (en) 2001-03-28 2002-03-12 METHOD FOR CONTROLLING A USER CONNECTION OF A COMMUNICATION NETWORK
US10/473,327 US7003320B2 (en) 2001-03-28 2002-03-12 Method for controlling a user terminal of a communications network
EP02707036A EP1374610B8 (en) 2001-03-28 2002-03-12 Method for controlling a user terminal of a communications network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP01107901A EP1246486A1 (en) 2001-03-28 2001-03-28 Method for controlling a user terminal of a communications network
EP01107901.9 2001-03-28

Publications (1)

Publication Number Publication Date
WO2002080599A1 true WO2002080599A1 (en) 2002-10-10

Family

ID=8176990

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2002/000757 WO2002080599A1 (en) 2001-03-28 2002-03-12 Method for controlling a user terminal of a communications network

Country Status (5)

Country Link
US (1) US7003320B2 (en)
EP (2) EP1246486A1 (en)
AT (1) ATE418242T1 (en)
DE (1) DE60230397D1 (en)
WO (1) WO2002080599A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466099B (en) * 2009-01-14 2011-12-07 中兴通讯股份有限公司 Safety monitoring method and mobile terminal based on packet data protocol activation request

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10258302B4 (en) * 2002-12-13 2007-10-11 Daimlerchrysler Ag Method for authorizing a telematics service in a motor vehicle
US20040203572A1 (en) * 2002-12-31 2004-10-14 Naveen Aerrabotu Emergency call-back for mobile terminals in a limited service mode
JP2005150983A (en) * 2003-11-12 2005-06-09 Ntt Docomo Inc Server apparatus
KR100664110B1 (en) * 2004-02-04 2007-01-04 엘지전자 주식회사 Usage restriction setting method for mobile communication device
US20060167871A1 (en) * 2004-12-17 2006-07-27 James Lee Sorenson Method and system for blocking specific network resources
KR100690762B1 (en) * 2005-05-10 2007-03-09 엘지전자 주식회사 A telephone call method and system for using many number in mobile communication station
EP1755273B1 (en) * 2005-08-18 2016-11-09 LG Electronics Inc. Apparatus and method for authenticating a telematics terminal in a vehicle
GB2450046B (en) 2006-03-29 2011-03-09 Kt Freetel Co Ltd Digital device and method for providing additional service by using the same
KR100808986B1 (en) * 2006-11-09 2008-03-04 삼성전자주식회사 Method and apparatus for executing the contents of a file in a mobile terminal
US20080268866A1 (en) * 2007-04-24 2008-10-30 Webtech Wireless Inc. Configurable telematics and location-based system
EP2129172A1 (en) * 2008-05-30 2009-12-02 Gemplus A method, a token and a system for processing a service
US20100159875A1 (en) * 2008-12-18 2010-06-24 International Business Machines Corporation Telephone Handset Contact List Synchronization
KR101572060B1 (en) * 2009-05-11 2015-11-26 삼성전자주식회사 Apparatus and method for power saving using predictive polling in portable terminal
US9125145B1 (en) * 2013-02-15 2015-09-01 Sprint Communications Company L.P. Mobile device centered communication routing module
US20170013427A1 (en) * 2015-07-10 2017-01-12 Qualcomm Incorporated Techniques for improved short message services
WO2018082105A1 (en) * 2016-11-07 2018-05-11 华为技术有限公司 Method and device for switching on-vehicle service using external sim card
CN108391242B (en) * 2018-02-26 2021-10-19 青岛海信移动通信技术股份有限公司 Remote control method and remote control device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999018704A2 (en) * 1997-10-02 1999-04-15 Ericsson Inc. System and method for providing restrictions on mobile-originated calls
US6011976A (en) * 1993-06-15 2000-01-04 Celltrace Communications Limited Telecommunications system with value added service directory and an integrated circuit module therefor

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2633411B1 (en) * 1988-06-28 1991-09-27 Schlumberger Ind Sa PORTABLE INFORMATION MEDIA MANAGEMENT SYSTEM
GB2241133A (en) * 1990-02-14 1991-08-21 Motorola Inc Radiotelephone having removable memory means for storing radio user validation code
US5148474A (en) * 1991-08-21 1992-09-15 Nancy Haralambopoulos Interactive value-added telecommunications system and method
US5761624A (en) * 1991-10-11 1998-06-02 Integrated Technologies Of America, Inc. Method and apparatus for controlling and recording cellular phone transactions using an integrated circuit card
FI98183C (en) * 1992-02-14 1997-04-25 Nokia Mobile Phones Ltd Arrangement for connecting a data adapter to a GSM cellular telephone
SE470519B (en) * 1992-11-09 1994-06-27 Ericsson Telefon Ab L M Device for providing services such as telephone communication data communication, etc comprising a terminal unit and an access unit
CN1071974C (en) * 1993-08-31 2001-09-26 艾利森·Ge·流动通讯有限公司 Apparatus for storing messages in a cellular mobile terminal
FR2711866B1 (en) * 1993-10-26 1996-05-24 Alcatel Mobile Comm France Installation of digital radio-telephone with mobile terminals.
US5675628A (en) * 1994-08-01 1997-10-07 Nokia Telecommunications Oy Method and apparatus for enabling roaming of subscriber among plural mobile radio systems, using mobile equipment accepting removable subscriber identity module
FI952146A (en) * 1995-05-04 1996-11-05 Nokia Telecommunications Oy Checking the eligibility of a subscriber device
US5887253A (en) * 1996-03-22 1999-03-23 Bellsouth Corporation Method for activating and servicing a cellular telephone
FI103469B (en) * 1996-09-17 1999-06-30 Nokia Telecommunications Oy Prevention of abuse of a copied subscriber code in a mobile telephone system
FR2756132B1 (en) * 1996-11-19 1998-12-11 Alsthom Cge Alcatel SUBSCRIBER IDENTIFICATION MODULE FOR MOBILE TELECOMMUNICATION TERMINAL, AND MOBILE TELECOMMUNICATION TERMINAL
US5884193A (en) * 1997-02-03 1999-03-16 Qualcomm Incorporated System and method for call restriction in a wireless communication device
CN1140099C (en) * 1997-02-14 2004-02-25 Ntt移动通信网株式会社 Method for controlling activation of mobile station, and mobile station using said method
JP3300262B2 (en) * 1997-09-22 2002-07-08 富士通株式会社 Mobile communication system and mobile terminal
GB2335568B (en) * 1998-03-18 2003-04-09 Nec Technologies Network operator controlled locking and unlocking mechanism for mobile phones
JP3283848B2 (en) * 1999-04-20 2002-05-20 エヌイーシーモバイリング株式会社 Mobile radio communication device and communication permission method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6011976A (en) * 1993-06-15 2000-01-04 Celltrace Communications Limited Telecommunications system with value added service directory and an integrated circuit module therefor
WO1999018704A2 (en) * 1997-10-02 1999-04-15 Ericsson Inc. System and method for providing restrictions on mobile-originated calls

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466099B (en) * 2009-01-14 2011-12-07 中兴通讯股份有限公司 Safety monitoring method and mobile terminal based on packet data protocol activation request

Also Published As

Publication number Publication date
EP1374610B8 (en) 2009-03-18
ATE418242T1 (en) 2009-01-15
US7003320B2 (en) 2006-02-21
EP1374610B1 (en) 2008-12-17
EP1374610A1 (en) 2004-01-02
US20040152445A1 (en) 2004-08-05
EP1246486A1 (en) 2002-10-02
DE60230397D1 (en) 2009-01-29

Similar Documents

Publication Publication Date Title
EP1374610B8 (en) Method for controlling a user terminal of a communications network
US10051100B2 (en) Mobile terminal apparatus
EP1523202B1 (en) Mobile communication terminal for protecting private contents and method for controlling the same
CA2202000C (en) Service transfer to a wireless telephone
US6215994B1 (en) System and method for over the air programming of mobile stations
JP4383666B2 (en) Mobile radio system capable of dynamically changing identification name
US6208872B1 (en) Method and apparatus for inhibition of calls while roaming
US6311063B1 (en) Method of and system for emulation of multiple subscriber profiles on a single mobile phone in a wireless telecommunications network
US5913175A (en) Method of making the use of a terminal of a cellular mobile radio system more secure, and corresponding terminal and user card
US6546239B1 (en) Mobile radio telephone with reduced key set
US7603108B2 (en) Automatic connection and access controls for communications devices
JPH0865720A (en) Automatic additional-function feeding method
JP4495833B2 (en) Method for allowing access from a simplified mobile telephone to a cellular mobile radio network, and associated mobile radio system and simplified telephone
CN101675416A (en) Interactive control of access to services and capabilities of a mobile device
CA2393142A1 (en) Method for emergency service access using a mobile phone
JPH11168560A (en) Terminal and permission card for subscriber, communication network and revision method for service profile assigned to the subscriber
JP4323089B2 (en) Procedure for accessing service in data communication system and data communication system
EP1220519B1 (en) Associating a gateway with a call type for establishing a link through the gateway when a number associated with the call type is dialled
US20020128002A1 (en) Wireless communication unit programming
US20010009854A1 (en) Method and devices for dialling services
US7006819B2 (en) Method of programming a telematics unit using voice recognition
US7027807B2 (en) Method for the user-initiated automatic subscription
KR20060123390A (en) System and method for managing emergency situations through a mobile terminal
US5905944A (en) Secure communication of access information
CA2147184A1 (en) Remote programming of a radio telephone system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2002707036

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2002707036

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 10473327

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP